Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429801
J. Jayasundara, R. Munasinghe
The determination of the motor and battery specification is one of the major challenges in the electric vehicle designs, specially considering the different kinds of requirements and specifications in different designs. This paper discusses about a method of simulating a vehicle in given terrains and driver models for extracting the torque, power and battery usage; and hence get the most optimized set of parameters for the given design requirement. The simulation takes the driver as a fuzzy model and the overall vehicle as a non-linear model for calculating the motor and battery requirements according to the terrain, driver commands and traffic condition.
{"title":"Electric vehicle simulator to determine motor and battery specifications","authors":"J. Jayasundara, R. Munasinghe","doi":"10.1109/ICIINFS.2009.5429801","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429801","url":null,"abstract":"The determination of the motor and battery specification is one of the major challenges in the electric vehicle designs, specially considering the different kinds of requirements and specifications in different designs. This paper discusses about a method of simulating a vehicle in given terrains and driver models for extracting the torque, power and battery usage; and hence get the most optimized set of parameters for the given design requirement. The simulation takes the driver as a fuzzy model and the overall vehicle as a non-linear model for calculating the motor and battery requirements according to the terrain, driver commands and traffic condition.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122126981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429880
K.C. Amarasinghe, K.G.A.B. Peiris, L.A.D.M.D. Thelisinghe, G.M. Warnakulasuriya, A. Samarasinghe
The study of empirical propagation models for mobile channels has been done extensively, but the applicability of those models to a Fixed Wireless Access (FWA) System is not appropriately tested. The candidate models include Hata - Okumura, COST 231 Hata, COST-Walfisch-Ikegami and Erceg. From those models Erceg model seems to be the most suitable. In this paper field measurements are taken for the 3.5GHz Fixed WiMAX network in Katubedda, Sri Lanka. Those are used to validate the applicability of the above mentioned propagation models in a sub urban environment in Sri Lanka.
{"title":"Comparison of propagation models for Fixed WiMAX system based on IEEE 802.16-2004","authors":"K.C. Amarasinghe, K.G.A.B. Peiris, L.A.D.M.D. Thelisinghe, G.M. Warnakulasuriya, A. Samarasinghe","doi":"10.1109/ICIINFS.2009.5429880","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429880","url":null,"abstract":"The study of empirical propagation models for mobile channels has been done extensively, but the applicability of those models to a Fixed Wireless Access (FWA) System is not appropriately tested. The candidate models include Hata - Okumura, COST 231 Hata, COST-Walfisch-Ikegami and Erceg. From those models Erceg model seems to be the most suitable. In this paper field measurements are taken for the 3.5GHz Fixed WiMAX network in Katubedda, Sri Lanka. Those are used to validate the applicability of the above mentioned propagation models in a sub urban environment in Sri Lanka.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123968006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429892
T.N.C. Fernando, A. Samarasinghe
Many equipment manufactures introduce proprietary protocols in network monitoring and equipment configuration to maintain market monopoly. This paper presenting a low cost solution to access, monitor and configure such equipments irrespective of its communication method. The solution consists of especially designed hardware modules which are collocated and connected with the equipments (need to monitor remotely) distributed over large geographical area. The system is designed such that multiple peer to peer connections can be setup with remotely held equipments to ensure the physical connectivity. Due to its' peer to peer and low level nature, system supports proprietary or standard network monitoring despite the differences of the equipment or the network monitoring software implementation. Furthermore, this paper discuss the solution facilitated the transportation of analogue and digital alarms from remote sites to a central network monitoring node which often equipment operators need separate transport system.
{"title":"Ethernet frame tunneling over GPRS/EDGE for universal network monitoring","authors":"T.N.C. Fernando, A. Samarasinghe","doi":"10.1109/ICIINFS.2009.5429892","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429892","url":null,"abstract":"Many equipment manufactures introduce proprietary protocols in network monitoring and equipment configuration to maintain market monopoly. This paper presenting a low cost solution to access, monitor and configure such equipments irrespective of its communication method. The solution consists of especially designed hardware modules which are collocated and connected with the equipments (need to monitor remotely) distributed over large geographical area. The system is designed such that multiple peer to peer connections can be setup with remotely held equipments to ensure the physical connectivity. Due to its' peer to peer and low level nature, system supports proprietary or standard network monitoring despite the differences of the equipment or the network monitoring software implementation. Furthermore, this paper discuss the solution facilitated the transportation of analogue and digital alarms from remote sites to a central network monitoring node which often equipment operators need separate transport system.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429877
P. L. K. Adikari, N. S. Ruwanpathirana, N. Ekanayake
The error probability of DPSK signals in Nakagami fading with EGC diversity reception is analyzed. The error rate is expressed as a (L + 1)-fold integral that contains only simple mathematical functions for L channel reception. The multiple integrals are easily evaluated with the Gauss-Legendre quadrature. Numerical values for the error rates of binary, quaternary and octonary DPSK signals are presented for several fading severity levels.
{"title":"Performance analysis for differential phase shift keying signals with Equal Gain Combining over Nakagami fading channels","authors":"P. L. K. Adikari, N. S. Ruwanpathirana, N. Ekanayake","doi":"10.1109/ICIINFS.2009.5429877","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429877","url":null,"abstract":"The error probability of DPSK signals in Nakagami fading with EGC diversity reception is analyzed. The error rate is expressed as a (L + 1)-fold integral that contains only simple mathematical functions for L channel reception. The multiple integrals are easily evaluated with the Gauss-Legendre quadrature. Numerical values for the error rates of binary, quaternary and octonary DPSK signals are presented for several fading severity levels.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429891
Chakshika Amarawardhana, Kushan Sharma Dayananada, Harshana Porawagama, C. Gamage
The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. Also in that case WSN (Wireless Sensor Networks, which is a new computing paradigm that emerged from the fusion of the SCADA systems and Ad hoc networks technologies, have gained the advantage over SCADA due to its simplicity and the ad-hoc nature of the network. This paper provides an overview of all the issues that are involved in strengthening the interconnectivity of SCADA networks and how the WSN has gained the advantage as a solution for SCADA. The paper describes the general architecture of WSN and SCADA networks and the properties of some of the commonly used SCADA communication protocols. This paper presents an overview of challenges in the design and implementation of WSNs. It summarizes the potential challenges that influence the WSNs design. Also this paper proposes an example solution to interconnect such environments using low cost and customizable sensor nodes which each has the computational power built in.
{"title":"Case study of WSN as a replacement for SCADA","authors":"Chakshika Amarawardhana, Kushan Sharma Dayananada, Harshana Porawagama, C. Gamage","doi":"10.1109/ICIINFS.2009.5429891","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429891","url":null,"abstract":"The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. Also in that case WSN (Wireless Sensor Networks, which is a new computing paradigm that emerged from the fusion of the SCADA systems and Ad hoc networks technologies, have gained the advantage over SCADA due to its simplicity and the ad-hoc nature of the network. This paper provides an overview of all the issues that are involved in strengthening the interconnectivity of SCADA networks and how the WSN has gained the advantage as a solution for SCADA. The paper describes the general architecture of WSN and SCADA networks and the properties of some of the commonly used SCADA communication protocols. This paper presents an overview of challenges in the design and implementation of WSNs. It summarizes the potential challenges that influence the WSNs design. Also this paper proposes an example solution to interconnect such environments using low cost and customizable sensor nodes which each has the computational power built in.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429850
P. P. C. R. Karunasekara, M. M. Dissanayake, N. Nanayakkara
Cadaver dissection is a valuable tool in anatomy teaching for medical students. With practical constraints that anatomy teachers face today, they seek to improve the quality of teaching using computer aided novel teaching methods. In this paper, we propose a cadaver dissection simulator based on the digital anatomical images of Visible Human Project dataset. The simulator would be used as a pre-lab tool to get familiar with the dissection process. Students are able to interact with the tool and define an organ or an area of a region to be removed. By defining and removing each successive organ/region, dissection could be carried out as it is being done in the laboratory. The original true colour is preserved in the rendered volume to impart a real life experience. In developing the simulator, the original digital images were pre-processed by “The Visible Human Preprocessing Toolkit” plug-in of ImageJ. Further processing was done through the Visualization Toolkit (VTK) to remove unnecessary patches that remained in the background. Segmentation of the preprocessed images was carried out by the “LiveWire” plug-in in ImageJ. Finally, true colour visualization was carried out through VTK. We successfully demonstrated the simulator for dissection in the abdomen region.
尸体解剖是医学生解剖教学的重要手段。面对当今解剖学教师所面临的实际限制,他们寻求利用计算机辅助的新颖教学方法来提高教学质量。在本文中,我们提出了一个基于可视化人体计划数据集的数字解剖图像的尸体解剖模拟器。该模拟器将用作实验室前的工具,以熟悉解剖过程。学生可以与该工具进行交互,并定义要移除的器官或区域的区域。通过定义和移除每个连续的器官/区域,可以像在实验室中一样进行解剖。原始的真实色彩被保留在渲染的体量中,以传递真实的生活体验。在模拟器的开发过程中,使用ImageJ的“the Visible Human Preprocessing Toolkit”插件对原始数字图像进行预处理。通过可视化工具包(VTK)进行进一步处理,以删除留在后台的不必要的补丁。通过ImageJ中的“LiveWire”插件对预处理后的图像进行分割。最后,通过VTK进行真彩可视化。我们成功地演示了腹部解剖模拟器。
{"title":"An interactive cadaver dissection simulator","authors":"P. P. C. R. Karunasekara, M. M. Dissanayake, N. Nanayakkara","doi":"10.1109/ICIINFS.2009.5429850","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429850","url":null,"abstract":"Cadaver dissection is a valuable tool in anatomy teaching for medical students. With practical constraints that anatomy teachers face today, they seek to improve the quality of teaching using computer aided novel teaching methods. In this paper, we propose a cadaver dissection simulator based on the digital anatomical images of Visible Human Project dataset. The simulator would be used as a pre-lab tool to get familiar with the dissection process. Students are able to interact with the tool and define an organ or an area of a region to be removed. By defining and removing each successive organ/region, dissection could be carried out as it is being done in the laboratory. The original true colour is preserved in the rendered volume to impart a real life experience. In developing the simulator, the original digital images were pre-processed by “The Visible Human Preprocessing Toolkit” plug-in of ImageJ. Further processing was done through the Visualization Toolkit (VTK) to remove unnecessary patches that remained in the background. Segmentation of the preprocessed images was carried out by the “LiveWire” plug-in in ImageJ. Finally, true colour visualization was carried out through VTK. We successfully demonstrated the simulator for dissection in the abdomen region.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124237849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429900
B. G. Patil, S. Subbaraman
The increase in security concerns on issues such as identity, theft indicates the needs of a new reliable security system. Iris recognition is perhaps the most accurate means of personnel identification due to the uniqueness of the patterns contained in each iris. This paper presents new image processing algorithm which specifically focuses on the characteristics of the phase components obtained from two-dimensional Fourier Transformation of image. The Phase Only Correlatlon (POC) and Band Limited Phase Only Correlatlon (BLPOC) are the most fundamental transformations, the features of which include superior discrimination capability over the ordinary recognition system.
{"title":"Human iris pattern recognition using phase components of image","authors":"B. G. Patil, S. Subbaraman","doi":"10.1109/ICIINFS.2009.5429900","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429900","url":null,"abstract":"The increase in security concerns on issues such as identity, theft indicates the needs of a new reliable security system. Iris recognition is perhaps the most accurate means of personnel identification due to the uniqueness of the patterns contained in each iris. This paper presents new image processing algorithm which specifically focuses on the characteristics of the phase components obtained from two-dimensional Fourier Transformation of image. The Phase Only Correlatlon (POC) and Band Limited Phase Only Correlatlon (BLPOC) are the most fundamental transformations, the features of which include superior discrimination capability over the ordinary recognition system.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429899
Debasish Jena, Saroj Kumar Panigrahy, S. K. Jena
Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cryptosystem for encrypting long messages, which is not only efficient but also secure. In consideration of the aspect of efficiency and computation, our proposed scheme uses elliptic curve cryptosystem.
{"title":"A novel and efficient cryptosystem for long message encryption","authors":"Debasish Jena, Saroj Kumar Panigrahy, S. K. Jena","doi":"10.1109/ICIINFS.2009.5429899","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429899","url":null,"abstract":"Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cryptosystem for encrypting long messages, which is not only efficient but also secure. In consideration of the aspect of efficiency and computation, our proposed scheme uses elliptic curve cryptosystem.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429825
Varsha A. Shah, Sanjay G. Karndhar, Ranjan Maheshwari, P. Kundu, H. Desai
In this paper, a simple and efficient power split rule based energy management algorithm is designed for optimal sharing of energy between different energy sources in parallel HEV. This algorithm is simulated in MATLAB for Indian driving cycle (urban drive cycle) and Indian express highway drive cycle. The results indicate that the split of power can allow the engine to operate at its best efficiency and the life of battery can also be improved significantly with the introduction of ultracapacitor by maintaining the battery state of charge (SOC) within desired limits.
{"title":"An energy management system for a battery ultracapacitor Hybrid Electric Vehicle","authors":"Varsha A. Shah, Sanjay G. Karndhar, Ranjan Maheshwari, P. Kundu, H. Desai","doi":"10.1109/ICIINFS.2009.5429825","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429825","url":null,"abstract":"In this paper, a simple and efficient power split rule based energy management algorithm is designed for optimal sharing of energy between different energy sources in parallel HEV. This algorithm is simulated in MATLAB for Indian driving cycle (urban drive cycle) and Indian express highway drive cycle. The results indicate that the split of power can allow the engine to operate at its best efficiency and the life of battery can also be improved significantly with the introduction of ultracapacitor by maintaining the battery state of charge (SOC) within desired limits.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICIINFS.2009.5429823
A.J.M.I. Jowsick, A. Arulampalam, H. M. Wijekoon
In this paper, the proposed interconnection of Sri Lankan power system grid and southern regional grid of Indian grid is modeled using a simple VSC configurations based on HVDC transmission. The control implemented is made in such a way that this will allow power transmissions in either way. Therefore voltage vector PLL based control together with DC-link voltage regulation is implemented. Here the HVDC both end VSC are operated with very similar controls and the only difference is one is operated as main and the other operated as sub. The main VSC controls the power flow and other follow up the main. The proposed system is modeled using PSCAD/EMTDC. Whilst the Impact of frequency variation and sudden load rejection due to one of the grid system failure is being analyzed in this paper, the reactive power control at both ends VSC to support the voltage regulation is also being studied. Simulation results show as to how the transients due to frequency fluctuation and country blackout will impact the HVDC transmission line's operations.
{"title":"HVDC transmission line for interconnecting power grids in India and Sri Lanka","authors":"A.J.M.I. Jowsick, A. Arulampalam, H. M. Wijekoon","doi":"10.1109/ICIINFS.2009.5429823","DOIUrl":"https://doi.org/10.1109/ICIINFS.2009.5429823","url":null,"abstract":"In this paper, the proposed interconnection of Sri Lankan power system grid and southern regional grid of Indian grid is modeled using a simple VSC configurations based on HVDC transmission. The control implemented is made in such a way that this will allow power transmissions in either way. Therefore voltage vector PLL based control together with DC-link voltage regulation is implemented. Here the HVDC both end VSC are operated with very similar controls and the only difference is one is operated as main and the other operated as sub. The main VSC controls the power flow and other follow up the main. The proposed system is modeled using PSCAD/EMTDC. Whilst the Impact of frequency variation and sudden load rejection due to one of the grid system failure is being analyzed in this paper, the reactive power control at both ends VSC to support the voltage regulation is also being studied. Simulation results show as to how the transients due to frequency fluctuation and country blackout will impact the HVDC transmission line's operations.","PeriodicalId":117199,"journal":{"name":"2009 International Conference on Industrial and Information Systems (ICIIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}